Library/Business/Management Information Systems: Managing the Digital Firm/Ethical and Social Issues in Information Systems

Ethical and Social Issues in Information Systems

50 questions available

Summary unavailable.

Questions

Question 1

According to the case study on ethical issues for the aged community, what is a primary recurring ethical issue associated with 'Smart House' technology?

View answer and explanation
Question 2

What are the five moral dimensions of the information age identified in the chapter?

View answer and explanation
Question 3

Which technology trend involves combining data from multiple sources to create detailed electronic dossiers of individuals?

View answer and explanation
Question 4

What is the primary purpose of Nonobvious Relationship Awareness (NORA) technology?

View answer and explanation
Question 5

Which ethical principle suggests that if an action is not right for everyone to take, it is not right for anyone?

View answer and explanation
Question 6

What is the ethical 'no free lunch' rule, as described in the chapter?

View answer and explanation
Question 7

What is the most important U.S. federal law regulating the federal government's collection, use, and disclosure of information?

View answer and explanation
Question 8

The European Directive on Data Protection requires companies to obtain what before they can legally use data about an individual?

View answer and explanation
Question 9

What is the primary method by which websites like Amazon.com track a visitor's activity and customize content for them upon return?

View answer and explanation
Question 10

What U.S. law makes it illegal to circumvent technology-based protections of copyrighted materials?

View answer and explanation
Question 11

Which of the following is NOT considered a principal source of poor system performance?

View answer and explanation
Question 12

The term for stress induced by computer use, with symptoms like aggravation, hostility, and impatience, is known as:

View answer and explanation
Question 13

In the Interactive Session about the iPhone becoming an iTrack, what was the primary commercial value of the location data gathered from cell phones?

View answer and explanation
Question 14

What is the core principle of the Fair Information Practices (FIP) regime?

View answer and explanation
Question 15

What is the legal protection for an intellectual work product, such as a formula or business process, that is not based on information in the public domain?

View answer and explanation
Question 16

What did GlaxoSmithKline pay in fines in 2012 for unlawful promotion of drugs and other civil and criminal liabilities?

View answer and explanation
Question 17

What is the first step in the five-step process for ethical analysis presented in the chapter?

View answer and explanation
Question 18

Which of the following best describes the opt-out model of informed consent?

View answer and explanation
Question 19

What is the primary drawback of copyright protection for software?

View answer and explanation
Question 20

A study by Symantec in 2012 found that what percentage of malware was being targeted at small businesses?

View answer and explanation
Question 21

The case study on monitoring in the workplace discusses a legal case (Copeland v the United Kingdom) where the European Court ruled in the employee's favor. On what grounds was the employee's privacy deemed violated?

View answer and explanation
Question 22

Which of the following is NOT one of the FTC's Fair Information Practice principles?

View answer and explanation
Question 23

According to the chapter, what is the 'digital divide'?

View answer and explanation
Question 24

The case study 'Facebook: It’s About the Money' states that in 2011, advertising revenue constituted what percentage of Facebook's total revenue?

View answer and explanation
Question 25

The concept of liability, a key element of ethical action, is defined as a feature of which type of system?

View answer and explanation
Question 26

What is the main purpose of professional codes of conduct, such as those from the ACM or AMA?

View answer and explanation
Question 27

The European Directive on Data Protection, which went into effect on October 25, 1998, is stricter than U.S. law primarily because:

View answer and explanation
Question 28

In the case of the BlackBerry outage in October 2011, what was the primary cause of the cascading failure?

View answer and explanation
Question 29

According to the chapter, what is the single largest source of Repetitive Stress Injury (RSI)?

View answer and explanation
Question 30

Approximately what percentage of people who spend three or more hours per day at a computer are affected by Computer Vision Syndrome (CVS)?

View answer and explanation
Question 31

What is the primary difference between a trade secret and a patent?

View answer and explanation
Question 32

The 2011 report from the Internet Crime Complaint Center (IC3) found the average financial loss for complainants was more than:

View answer and explanation
Question 33

According to the chapter, which two technology trends are most directly responsible for making the routine violation of individual privacy cheap and effective?

View answer and explanation
Question 34

What does 'accountability' mean as a basic concept in ethics?

View answer and explanation
Question 35

The proposed 'Do-Not-Track Online Act of 2011' would require firms to:

View answer and explanation
Question 36

How does patent law differ from copyright law in what it protects?

View answer and explanation
Question 37

The Ninth Annual Global Software Piracy Study reported that the rate of global software piracy climbed to what percentage in 2011?

View answer and explanation
Question 38

What is the primary reason it is so difficult to hold software producers liable for damages from their software?

View answer and explanation
Question 39

The term 'spam' is described as junk e-mail sent to a mass audience of Internet users. Approximately what percentage of all e-mail was estimated to be spam in 2012?

View answer and explanation
Question 40

What is the primary argument made by economists like Erik Brynjolfsson and Andrew P. McAfee regarding the impact of new technology on employment?

View answer and explanation
Question 41

In the Facebook case study, what is 'weblining'?

View answer and explanation
Question 42

According to a Consumer Reports study cited in the Facebook case study, how many of the 150 million Americans on Facebook have never adjusted their privacy controls?

View answer and explanation
Question 43

What does the concept of 'due process' ensure in a law-governed society?

View answer and explanation
Question 44

Descartes' rule of change is also known as the:

View answer and explanation
Question 45

What is the primary function of Web beacons?

View answer and explanation
Question 46

In what year did the European Parliament pass new rules governing the use of third-party cookies for behavioral tracking?

View answer and explanation
Question 47

What is the primary difference between a computer virus and a computer worm?

View answer and explanation
Question 48

The practice of tricking employees into revealing their passwords by pretending to be legitimate members of a company is known as:

View answer and explanation
Question 49

In the case study about the aged community, what social and cultural consideration might make sensor-based monitoring systems unacceptable?

View answer and explanation
Question 50

What type of intellectual property protection grants an exclusive monopoly on the ideas behind an invention for 20 years?

View answer and explanation